2021-06-04 02:30:37 +03:00
|
|
|
// Copyright 2021 Security Scorecard Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package checks
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2021-06-04 03:12:56 +03:00
|
|
|
"strings"
|
2021-06-04 02:30:37 +03:00
|
|
|
|
|
|
|
"gopkg.in/yaml.v2"
|
|
|
|
|
2021-07-26 21:01:25 +03:00
|
|
|
"github.com/ossf/scorecard/v2/checker"
|
|
|
|
sce "github.com/ossf/scorecard/v2/errors"
|
2021-06-04 02:30:37 +03:00
|
|
|
)
|
|
|
|
|
2021-08-01 01:31:34 +03:00
|
|
|
// CheckTokenPermissions is the exported name for Token-Permissions check.
|
2021-07-30 03:13:01 +03:00
|
|
|
const CheckTokenPermissions = "Token-Permissions"
|
2021-06-04 02:30:37 +03:00
|
|
|
|
|
|
|
//nolint:gochecknoinits
|
|
|
|
func init() {
|
2021-07-30 03:13:01 +03:00
|
|
|
registerCheck(CheckTokenPermissions, TokenPermissions)
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
2021-07-30 03:13:01 +03:00
|
|
|
// Holds stateful data to pass thru callbacks.
|
|
|
|
// Each field correpsonds to a GitHub permission type, and
|
|
|
|
// will hold true if declared non-write, false otherwise.
|
|
|
|
type permissionCbData struct {
|
|
|
|
writePermissions map[string]bool
|
|
|
|
}
|
|
|
|
|
2021-08-01 01:31:34 +03:00
|
|
|
// TokenPermissions runs Token-Permissions check.
|
2021-07-30 03:13:01 +03:00
|
|
|
func TokenPermissions(c *checker.CheckRequest) checker.CheckResult {
|
|
|
|
data := permissionCbData{writePermissions: make(map[string]bool)}
|
2021-07-30 18:09:52 +03:00
|
|
|
err := CheckFilesContent(".github/workflows/*", false,
|
2021-07-30 03:13:01 +03:00
|
|
|
c, validateGitHubActionTokenPermissions, &data)
|
|
|
|
return createResultForLeastPrivilegeTokens(data, err)
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func validatePermission(key string, value interface{}, path string,
|
2021-07-30 03:13:01 +03:00
|
|
|
dl checker.DetailLogger, pdata *permissionCbData) error {
|
2021-06-04 03:12:56 +03:00
|
|
|
val, ok := value.(string)
|
|
|
|
if !ok {
|
2021-07-21 19:21:43 +03:00
|
|
|
//nolint
|
2021-07-30 03:13:01 +03:00
|
|
|
return sce.Create(sce.ErrScorecardInternal, errInvalidGitHubWorkflowFile.Error())
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
2021-06-04 03:12:56 +03:00
|
|
|
|
|
|
|
if strings.EqualFold(val, "write") {
|
2021-07-30 03:13:01 +03:00
|
|
|
if isPermissionOfInterest(key) {
|
|
|
|
dl.Warn("'%v' permission set to '%v' in %v", key, val, path)
|
|
|
|
recordPermissionWrite(key, pdata)
|
|
|
|
} else {
|
|
|
|
// Only log for debugging, otherwise
|
|
|
|
// it may confuse users.
|
|
|
|
dl.Debug("'%v' permission set to '%v' in %v", key, val, path)
|
|
|
|
}
|
|
|
|
return nil
|
2021-06-04 03:12:56 +03:00
|
|
|
}
|
|
|
|
|
2021-07-21 19:21:43 +03:00
|
|
|
dl.Info("'%v' permission set to '%v' in %v", key, val, path)
|
2021-07-30 03:13:01 +03:00
|
|
|
return nil
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func validateMapPermissions(values map[interface{}]interface{}, path string,
|
2021-07-30 03:13:01 +03:00
|
|
|
dl checker.DetailLogger, pdata *permissionCbData) error {
|
2021-06-04 02:30:37 +03:00
|
|
|
// Iterate over the permission, verify keys and values are strings.
|
|
|
|
for k, v := range values {
|
2021-06-04 03:12:56 +03:00
|
|
|
key, ok := k.(string)
|
|
|
|
if !ok {
|
2021-07-21 19:21:43 +03:00
|
|
|
//nolint
|
2021-07-30 03:13:01 +03:00
|
|
|
return sce.Create(sce.ErrScorecardInternal, errInvalidGitHubWorkflowFile.Error())
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
2021-06-04 03:12:56 +03:00
|
|
|
|
2021-07-30 03:13:01 +03:00
|
|
|
if err := validatePermission(key, v, path, dl, pdata); err != nil {
|
|
|
|
return err
|
2021-06-04 03:12:56 +03:00
|
|
|
}
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
2021-07-30 03:13:01 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func recordPermissionWrite(name string, pdata *permissionCbData) {
|
|
|
|
pdata.writePermissions[name] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
func recordAllPermissionsWrite(pdata *permissionCbData) {
|
|
|
|
// Special case: `all` does not correspond
|
|
|
|
// to a GitHub permission.
|
|
|
|
pdata.writePermissions["all"] = true
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func validateReadPermissions(config map[interface{}]interface{}, path string,
|
2021-07-30 03:13:01 +03:00
|
|
|
dl checker.DetailLogger, pdata *permissionCbData) error {
|
2021-06-07 21:01:18 +03:00
|
|
|
var permissions interface{}
|
|
|
|
|
|
|
|
// Check if permissions are set explicitly.
|
|
|
|
permissions, ok := config["permissions"]
|
|
|
|
if !ok {
|
2021-07-21 19:21:43 +03:00
|
|
|
dl.Warn("no permission defined in %v", path)
|
2021-07-30 03:13:01 +03:00
|
|
|
recordAllPermissionsWrite(pdata)
|
|
|
|
return nil
|
2021-06-07 21:01:18 +03:00
|
|
|
}
|
2021-06-04 02:30:37 +03:00
|
|
|
|
2021-06-07 21:01:18 +03:00
|
|
|
// Check the type of our values.
|
|
|
|
switch val := permissions.(type) {
|
|
|
|
// Empty string is nil type.
|
|
|
|
// It defaults to 'none'
|
|
|
|
case nil:
|
2021-07-30 03:13:01 +03:00
|
|
|
dl.Info("permissions set to 'none' in %v", path)
|
2021-06-07 21:01:18 +03:00
|
|
|
// String type.
|
|
|
|
case string:
|
|
|
|
if !strings.EqualFold(val, "read-all") && val != "" {
|
2021-07-30 03:13:01 +03:00
|
|
|
dl.Warn("permissions set to '%v' in %v", val, path)
|
|
|
|
recordAllPermissionsWrite(pdata)
|
|
|
|
return nil
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
2021-07-21 19:21:43 +03:00
|
|
|
dl.Info("permission set to '%v' in %v", val, path)
|
2021-06-04 02:30:37 +03:00
|
|
|
|
2021-06-07 21:01:18 +03:00
|
|
|
// Map type.
|
|
|
|
case map[interface{}]interface{}:
|
2021-07-30 03:13:01 +03:00
|
|
|
if err := validateMapPermissions(val, path, dl, pdata); err != nil {
|
|
|
|
return err
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
2021-06-07 21:01:18 +03:00
|
|
|
// Invalid type.
|
|
|
|
default:
|
2021-07-21 19:21:43 +03:00
|
|
|
//nolint
|
2021-07-30 03:13:01 +03:00
|
|
|
return sce.Create(sce.ErrScorecardInternal, errInvalidGitHubWorkflowFile.Error())
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
2021-07-30 03:13:01 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func isPermissionOfInterest(name string) bool {
|
|
|
|
return strings.EqualFold(name, "statuses") ||
|
|
|
|
strings.EqualFold(name, "checks") ||
|
|
|
|
strings.EqualFold(name, "security-events") ||
|
|
|
|
strings.EqualFold(name, "deployments") ||
|
|
|
|
strings.EqualFold(name, "contents") ||
|
|
|
|
strings.EqualFold(name, "packages") ||
|
|
|
|
strings.EqualFold(name, "options")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Calculate the score.
|
|
|
|
func calculateScore(result permissionCbData) int {
|
|
|
|
// See list https://github.blog/changelog/2021-04-20-github-actions-control-permissions-for-github_token/.
|
|
|
|
// Note: there are legitimate reasons to use some of the permissions like checks, deployments, etc.
|
|
|
|
// in CI/CD systems https://docs.travis-ci.com/user/github-oauth-scopes/.
|
|
|
|
if _, ok := result.writePermissions["all"]; ok {
|
|
|
|
return checker.MinResultScore
|
|
|
|
}
|
|
|
|
|
|
|
|
score := float32(checker.MaxResultScore)
|
|
|
|
// status: https://docs.github.com/en/rest/reference/repos#statuses.
|
|
|
|
// May allow an attacker to change the result of pre-submit and get a PR merged.
|
|
|
|
// Low risk: -0.5.
|
|
|
|
if _, ok := result.writePermissions["statuses"]; ok {
|
|
|
|
score -= 0.5
|
|
|
|
}
|
|
|
|
|
|
|
|
// checks.
|
|
|
|
// May allow an attacker to edit checks to remove pre-submit and introduce a bug.
|
|
|
|
// Low risk: -0.5.
|
|
|
|
if _, ok := result.writePermissions["checks"]; ok {
|
|
|
|
score -= 0.5
|
|
|
|
}
|
|
|
|
|
|
|
|
// secEvents.
|
|
|
|
// May allow attacker to read vuln reports before patch available.
|
|
|
|
// Low risk: -1
|
|
|
|
if _, ok := result.writePermissions["security-events"]; ok {
|
|
|
|
score--
|
|
|
|
}
|
|
|
|
|
|
|
|
// deployments: https://docs.github.com/en/rest/reference/repos#deployments.
|
|
|
|
// May allow attacker to charge repo owner by triggering VM runs,
|
|
|
|
// and tiny chance an attacker can trigger a remote
|
|
|
|
// service with code they own if server accepts code/location var unsanitized.
|
|
|
|
// Low risk: -1
|
|
|
|
if _, ok := result.writePermissions["deployments"]; ok {
|
|
|
|
score--
|
|
|
|
}
|
|
|
|
|
|
|
|
// contents.
|
|
|
|
// Allows attacker to commit unreviewed code.
|
|
|
|
// High risk: -10
|
|
|
|
if _, ok := result.writePermissions["contents"]; ok {
|
|
|
|
score -= checker.MaxResultScore
|
|
|
|
}
|
|
|
|
|
|
|
|
// packages.
|
|
|
|
// Allows attacker to publish packages.
|
|
|
|
// High risk: -10
|
|
|
|
if _, ok := result.writePermissions["packages"]; ok {
|
|
|
|
score -= checker.MaxResultScore
|
|
|
|
}
|
|
|
|
|
|
|
|
// actions.
|
|
|
|
// May allow an attacker to steal GitHub secrets by adding a malicious workflow/action.
|
|
|
|
// High risk: -10
|
|
|
|
if _, ok := result.writePermissions["actions"]; ok {
|
|
|
|
score -= checker.MaxResultScore
|
|
|
|
}
|
|
|
|
|
|
|
|
if score < checker.MinResultScore {
|
|
|
|
return checker.MinResultScore
|
|
|
|
}
|
|
|
|
|
|
|
|
return int(score)
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
2021-07-21 19:21:43 +03:00
|
|
|
// Create the result.
|
2021-07-30 03:13:01 +03:00
|
|
|
func createResultForLeastPrivilegeTokens(result permissionCbData, err error) checker.CheckResult {
|
2021-07-21 19:21:43 +03:00
|
|
|
if err != nil {
|
2021-07-30 03:13:01 +03:00
|
|
|
return checker.CreateRuntimeErrorResult(CheckTokenPermissions, err)
|
2021-07-21 19:21:43 +03:00
|
|
|
}
|
2021-07-30 03:13:01 +03:00
|
|
|
|
|
|
|
score := calculateScore(result)
|
|
|
|
|
|
|
|
if score != checker.MaxResultScore {
|
|
|
|
return checker.CreateResultWithScore(CheckTokenPermissions,
|
|
|
|
"non read-only tokens detected in GitHub workflows", score)
|
2021-07-21 19:21:43 +03:00
|
|
|
}
|
|
|
|
|
2021-07-30 03:13:01 +03:00
|
|
|
return checker.CreateMaxScoreResult(CheckTokenPermissions,
|
2021-07-21 19:21:43 +03:00
|
|
|
"tokens are read-only in GitHub workflows")
|
|
|
|
}
|
|
|
|
|
|
|
|
func testValidateGitHubActionTokenPermissions(pathfn string,
|
|
|
|
content []byte, dl checker.DetailLogger) checker.CheckResult {
|
2021-07-30 03:13:01 +03:00
|
|
|
data := permissionCbData{writePermissions: make(map[string]bool)}
|
|
|
|
_, err := validateGitHubActionTokenPermissions(pathfn, content, dl, &data)
|
|
|
|
return createResultForLeastPrivilegeTokens(data, err)
|
2021-07-21 19:21:43 +03:00
|
|
|
}
|
|
|
|
|
2021-06-04 02:30:37 +03:00
|
|
|
// Check file content.
|
|
|
|
func validateGitHubActionTokenPermissions(path string, content []byte,
|
2021-07-30 03:13:01 +03:00
|
|
|
dl checker.DetailLogger, data FileCbData) (bool, error) {
|
|
|
|
// Verify the type of the data.
|
|
|
|
pdata, ok := data.(*permissionCbData)
|
|
|
|
if !ok {
|
|
|
|
// This never happens.
|
|
|
|
panic("invalid type")
|
|
|
|
}
|
|
|
|
|
|
|
|
if !CheckFileContainsCommands(content, "#") {
|
|
|
|
return true, nil
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
var workflow map[interface{}]interface{}
|
2021-07-30 03:13:01 +03:00
|
|
|
err := yaml.Unmarshal(content, &workflow)
|
2021-06-04 02:30:37 +03:00
|
|
|
if err != nil {
|
2021-07-21 19:21:43 +03:00
|
|
|
//nolint
|
2021-07-30 03:13:01 +03:00
|
|
|
return false,
|
|
|
|
sce.Create(sce.ErrScorecardInternal, fmt.Sprintf("yaml.Unmarshal: %v", err))
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// 1. Check that each file uses 'content: read' only or 'none'.
|
|
|
|
//nolint
|
|
|
|
// https://docs.github.com/en/actions/reference/authentication-in-a-workflow#example-1-passing-the-github_token-as-an-input,
|
|
|
|
// https://github.blog/changelog/2021-04-20-github-actions-control-permissions-for-github_token/,
|
|
|
|
// https://docs.github.com/en/actions/reference/authentication-in-a-workflow#modifying-the-permissions-for-the-github_token.
|
2021-07-30 03:13:01 +03:00
|
|
|
if err := validateReadPermissions(workflow, path, dl, pdata); err != nil {
|
|
|
|
return false, err
|
2021-06-04 02:30:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(laurent): 2. Identify github actions that require write and add checks.
|
|
|
|
|
|
|
|
// TODO(laurent): 3. Read a few runs and ensures they have the same permissions.
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}
|